Computing Power, Key Length and Cryptanalysis. An Unending Battle?
Abstract
There are several methods to measure computing power. On the other hand, Bit Length (BL) can be considered a metric to measure the strength of an asymmetric encryption method. We review here ways to determine the security, given an span of time, of a factoring-based encryption method, such as RSA, by establishing a relation between the processing power needed to break a given encryption and the given bit length used in the encryption. This relation would help us provide an estimation of the time span that an encryption method for a given BL will be secure from attacks.
- Publication:
-
arXiv e-prints
- Pub Date:
- November 2020
- DOI:
- 10.48550/arXiv.2011.00985
- arXiv:
- arXiv:2011.00985
- Bibcode:
- 2020arXiv201100985D
- Keywords:
-
- Computer Science - Cryptography and Security